An individual has their personal information stolen. They discover that someone is using that information to impersonate them and commit fraud. What does this scenario describe?
- Data breach
- Secured customer data
- Network infiltration
- Identity theft